Cryptology (Cryptography and Cryptanalysis)Cybersecurity Research Domains Hardware technology (RFID, chips, sensors, networking, etc.)Internet of Things, embedded systems, pervasive systemsOpen hardwareProtocols and frameworks for authentication, authorization, and rights managementSecuritySecurity testing and validationSoftware and Hardware Security EngineeringVulnerability discovery and penetration testing
Cryptology (Cryptography and Cryptanalysis)Cybersecurity Research Domains Internet of Things, embedded systems, pervasive systemsMeasurement and assessment of security levels.Post-quantum cryptographySecurity
Cryptology (Cryptography and Cryptanalysis)Cybersecurity Research Domains Hardware technology (RFID, chips, sensors, networking, etc.)Internet of Things, embedded systems, pervasive systemsOpen hardwareProtocols and frameworks for authentication, authorization, and rights managementSecuritySecurity testing and validationSoftware and Hardware Security EngineeringVulnerability discovery and penetration testing
Cryptology (Cryptography and Cryptanalysis)Cybersecurity Research Domains Internet of Things, embedded systems, pervasive systemsMeasurement and assessment of security levels.Post-quantum cryptographySecurity
Cryptology (Cryptography and Cryptanalysis)Cybersecurity Research Domains Hardware technology (RFID, chips, sensors, networking, etc.)Internet of Things, embedded systems, pervasive systemsOpen hardwareProtocols and frameworks for authentication, authorization, and rights managementSecuritySecurity testing and validationSoftware and Hardware Security EngineeringVulnerability discovery and penetration testing
Cryptology (Cryptography and Cryptanalysis)Cybersecurity Research Domains Internet of Things, embedded systems, pervasive systemsMeasurement and assessment of security levels.Post-quantum cryptographySecurity
Cryptology (Cryptography and Cryptanalysis)Cybersecurity Research Domains Hardware technology (RFID, chips, sensors, networking, etc.)Internet of Things, embedded systems, pervasive systemsOpen hardwareProtocols and frameworks for authentication, authorization, and rights managementSecuritySecurity testing and validationSoftware and Hardware Security EngineeringVulnerability discovery and penetration testing
Cryptology (Cryptography and Cryptanalysis)Cybersecurity Research Domains Internet of Things, embedded systems, pervasive systemsMeasurement and assessment of security levels.Post-quantum cryptographySecurity
Cryptology (Cryptography and Cryptanalysis)Cybersecurity Research Domains Hardware technology (RFID, chips, sensors, networking, etc.)Internet of Things, embedded systems, pervasive systemsOpen hardwareProtocols and frameworks for authentication, authorization, and rights managementSecuritySecurity testing and validationSoftware and Hardware Security EngineeringVulnerability discovery and penetration testing
Cryptology (Cryptography and Cryptanalysis)Cybersecurity Research Domains Internet of Things, embedded systems, pervasive systemsMeasurement and assessment of security levels.Post-quantum cryptographySecurity
HORIZON-CL3-2025-02-CS-ECCC-06HORIZON-CL3-2025-02-CS-ECCCNew theoretically-based techniques for the formal analysis and design of cryptographic protocols and their applicationsPost-quantum cryptography
HORIZON-CL3-2025-02-CS-ECCC-01HORIZON-CL3-2025-02-CS-ECCCArtificial Intelligence & Decision supportArtificial intelligence, intelligent systems, multi agent systemsCybersecurityData Security and PrivacyMachine learning, statistical data processing and applications using signal processing (e.g. speech, image, video)Other medical sciences
Cryptology (Cryptography and Cryptanalysis)Cybersecurity Research Domains Hardware technology (RFID, chips, sensors, networking, etc.)Internet of Things, embedded systems, pervasive systemsOpen hardwareProtocols and frameworks for authentication, authorization, and rights managementSecuritySecurity testing and validationSoftware and Hardware Security EngineeringVulnerability discovery and penetration testing
Cryptology (Cryptography and Cryptanalysis)Cybersecurity Research Domains Internet of Things, embedded systems, pervasive systemsMeasurement and assessment of security levels.Post-quantum cryptographySecurity
Cryptology (Cryptography and Cryptanalysis)Cybersecurity Research Domains Hardware technology (RFID, chips, sensors, networking, etc.)Internet of Things, embedded systems, pervasive systemsOpen hardwareProtocols and frameworks for authentication, authorization, and rights managementSecuritySecurity testing and validationSoftware and Hardware Security EngineeringVulnerability discovery and penetration testing
Cryptology (Cryptography and Cryptanalysis)Cybersecurity Research Domains Internet of Things, embedded systems, pervasive systemsMeasurement and assessment of security levels.Post-quantum cryptographySecurity
Cryptology (Cryptography and Cryptanalysis)Cybersecurity Research Domains Hardware technology (RFID, chips, sensors, networking, etc.)Internet of Things, embedded systems, pervasive systemsOpen hardwareProtocols and frameworks for authentication, authorization, and rights managementSecuritySecurity testing and validationSoftware and Hardware Security EngineeringVulnerability discovery and penetration testing
Cryptology (Cryptography and Cryptanalysis)Cybersecurity Research Domains Internet of Things, embedded systems, pervasive systemsMeasurement and assessment of security levels.Post-quantum cryptographySecurity
Cryptology (Cryptography and Cryptanalysis)Cybersecurity Research Domains Hardware technology (RFID, chips, sensors, networking, etc.)Internet of Things, embedded systems, pervasive systemsOpen hardwareProtocols and frameworks for authentication, authorization, and rights managementSecuritySecurity testing and validationSoftware and Hardware Security EngineeringVulnerability discovery and penetration testing
Cryptology (Cryptography and Cryptanalysis)Cybersecurity Research Domains Internet of Things, embedded systems, pervasive systemsMeasurement and assessment of security levels.Post-quantum cryptographySecurity
Cryptology (Cryptography and Cryptanalysis)Cybersecurity Research Domains Hardware technology (RFID, chips, sensors, networking, etc.)Internet of Things, embedded systems, pervasive systemsOpen hardwareProtocols and frameworks for authentication, authorization, and rights managementSecuritySecurity testing and validationSoftware and Hardware Security EngineeringVulnerability discovery and penetration testing
Cryptology (Cryptography and Cryptanalysis)Cybersecurity Research Domains Internet of Things, embedded systems, pervasive systemsMeasurement and assessment of security levels.Post-quantum cryptographySecurity
Cryptology (Cryptography and Cryptanalysis)Cybersecurity Research Domains Hardware technology (RFID, chips, sensors, networking, etc.)Internet of Things, embedded systems, pervasive systemsOpen hardwareProtocols and frameworks for authentication, authorization, and rights managementSecuritySecurity testing and validationSoftware and Hardware Security EngineeringVulnerability discovery and penetration testing
Cryptology (Cryptography and Cryptanalysis)Cybersecurity Research Domains Internet of Things, embedded systems, pervasive systemsMeasurement and assessment of security levels.Post-quantum cryptographySecurity
Cryptology (Cryptography and Cryptanalysis)Cybersecurity Research Domains Hardware technology (RFID, chips, sensors, networking, etc.)Internet of Things, embedded systems, pervasive systemsOpen hardwareProtocols and frameworks for authentication, authorization, and rights managementSecuritySecurity testing and validationSoftware and Hardware Security EngineeringVulnerability discovery and penetration testing
Cryptology (Cryptography and Cryptanalysis)Cybersecurity Research Domains Internet of Things, embedded systems, pervasive systemsMeasurement and assessment of security levels.Post-quantum cryptographySecurity
Cryptology (Cryptography and Cryptanalysis)Cybersecurity Research Domains Hardware technology (RFID, chips, sensors, networking, etc.)Internet of Things, embedded systems, pervasive systemsOpen hardwareProtocols and frameworks for authentication, authorization, and rights managementSecuritySecurity testing and validationSoftware and Hardware Security EngineeringVulnerability discovery and penetration testing
Cryptology (Cryptography and Cryptanalysis)Cybersecurity Research Domains Internet of Things, embedded systems, pervasive systemsMeasurement and assessment of security levels.Post-quantum cryptographySecurity
Cryptology (Cryptography and Cryptanalysis)Cybersecurity Research Domains Hardware technology (RFID, chips, sensors, networking, etc.)Internet of Things, embedded systems, pervasive systemsOpen hardwareProtocols and frameworks for authentication, authorization, and rights managementSecuritySecurity testing and validationSoftware and Hardware Security EngineeringVulnerability discovery and penetration testing
Cryptology (Cryptography and Cryptanalysis)Cybersecurity Research Domains Internet of Things, embedded systems, pervasive systemsMeasurement and assessment of security levels.Post-quantum cryptographySecurity
Cryptology (Cryptography and Cryptanalysis)Cybersecurity Research Domains Hardware technology (RFID, chips, sensors, networking, etc.)Internet of Things, embedded systems, pervasive systemsOpen hardwareProtocols and frameworks for authentication, authorization, and rights managementSecuritySecurity testing and validationSoftware and Hardware Security EngineeringVulnerability discovery and penetration testing
Cryptology (Cryptography and Cryptanalysis)Cybersecurity Research Domains Internet of Things, embedded systems, pervasive systemsMeasurement and assessment of security levels.Post-quantum cryptographySecurity
Cryptology (Cryptography and Cryptanalysis)Cybersecurity Research Domains Hardware technology (RFID, chips, sensors, networking, etc.)Internet of Things, embedded systems, pervasive systemsOpen hardwareProtocols and frameworks for authentication, authorization, and rights managementSecuritySecurity testing and validationSoftware and Hardware Security EngineeringVulnerability discovery and penetration testing
Cryptology (Cryptography and Cryptanalysis)Cybersecurity Research Domains Internet of Things, embedded systems, pervasive systemsMeasurement and assessment of security levels.Post-quantum cryptographySecurity
Cryptology (Cryptography and Cryptanalysis)Cybersecurity Research Domains Hardware technology (RFID, chips, sensors, networking, etc.)Internet of Things, embedded systems, pervasive systemsOpen hardwareProtocols and frameworks for authentication, authorization, and rights managementSecuritySecurity testing and validationSoftware and Hardware Security EngineeringVulnerability discovery and penetration testing
Cryptology (Cryptography and Cryptanalysis)Cybersecurity Research Domains Internet of Things, embedded systems, pervasive systemsMeasurement and assessment of security levels.Post-quantum cryptographySecurity
Cryptology (Cryptography and Cryptanalysis)Cybersecurity Research Domains Hardware technology (RFID, chips, sensors, networking, etc.)Internet of Things, embedded systems, pervasive systemsOpen hardwareProtocols and frameworks for authentication, authorization, and rights managementSecuritySecurity testing and validationSoftware and Hardware Security EngineeringVulnerability discovery and penetration testing
Cryptology (Cryptography and Cryptanalysis)Cybersecurity Research Domains Internet of Things, embedded systems, pervasive systemsMeasurement and assessment of security levels.Post-quantum cryptographySecurity
Cryptology (Cryptography and Cryptanalysis)Cybersecurity Research Domains Hardware technology (RFID, chips, sensors, networking, etc.)Internet of Things, embedded systems, pervasive systemsOpen hardwareProtocols and frameworks for authentication, authorization, and rights managementSecuritySecurity testing and validationSoftware and Hardware Security EngineeringVulnerability discovery and penetration testing
Cryptology (Cryptography and Cryptanalysis)Cybersecurity Research Domains Internet of Things, embedded systems, pervasive systemsMeasurement and assessment of security levels.Post-quantum cryptographySecurity
Cryptology (Cryptography and Cryptanalysis)Cybersecurity Research Domains Hardware technology (RFID, chips, sensors, networking, etc.)Internet of Things, embedded systems, pervasive systemsOpen hardwareProtocols and frameworks for authentication, authorization, and rights managementSecuritySecurity testing and validationSoftware and Hardware Security EngineeringVulnerability discovery and penetration testing
Cryptology (Cryptography and Cryptanalysis)Cybersecurity Research Domains Internet of Things, embedded systems, pervasive systemsMeasurement and assessment of security levels.Post-quantum cryptographySecurity
Cryptology (Cryptography and Cryptanalysis)Cybersecurity Research Domains Hardware technology (RFID, chips, sensors, networking, etc.)Internet of Things, embedded systems, pervasive systemsOpen hardwareProtocols and frameworks for authentication, authorization, and rights managementSecuritySecurity testing and validationSoftware and Hardware Security EngineeringVulnerability discovery and penetration testing
Cryptology (Cryptography and Cryptanalysis)Cybersecurity Research Domains Internet of Things, embedded systems, pervasive systemsMeasurement and assessment of security levels.Post-quantum cryptographySecurity
Cryptology (Cryptography and Cryptanalysis)Cybersecurity Research Domains Hardware technology (RFID, chips, sensors, networking, etc.)Internet of Things, embedded systems, pervasive systemsOpen hardwareProtocols and frameworks for authentication, authorization, and rights managementSecuritySecurity testing and validationSoftware and Hardware Security EngineeringVulnerability discovery and penetration testing
Cryptology (Cryptography and Cryptanalysis)Cybersecurity Research Domains Internet of Things, embedded systems, pervasive systemsMeasurement and assessment of security levels.Post-quantum cryptographySecurity
Cryptology (Cryptography and Cryptanalysis)Cybersecurity Research Domains Hardware technology (RFID, chips, sensors, networking, etc.)Internet of Things, embedded systems, pervasive systemsOpen hardwareProtocols and frameworks for authentication, authorization, and rights managementSecuritySecurity testing and validationSoftware and Hardware Security EngineeringVulnerability discovery and penetration testing
Cryptology (Cryptography and Cryptanalysis)Cybersecurity Research Domains Internet of Things, embedded systems, pervasive systemsMeasurement and assessment of security levels.Post-quantum cryptographySecurity